Home
last modified time | relevance | path

Searched refs:peerMsg (Results 1 – 6 of 6) sorted by relevance

/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Diso_protocol.c106 if (msg->peerMsg.length > 0 && msg->peerMsg.val != NULL) { in BuildSelfTokenMessage()
107 …if (memcpy_s(message + usedLen, messageLen - usedLen, msg->peerMsg.val, msg->peerMsg.length) != EO… in BuildSelfTokenMessage()
139 if (msg->peerMsg.length > 0 && msg->peerMsg.val != NULL) { in BuildPeerTokenMessage()
140 …if (memcpy_s(message + usedLen, messageLen - usedLen, msg->peerMsg.val, msg->peerMsg.length) != EO… in BuildPeerTokenMessage()
144 usedLen += msg->peerMsg.length; in BuildPeerTokenMessage()
161 msg->selfMsg.length + msg->peerMsg.length; in IsoCalToken()
796 static int32_t SetIsoPeerProtectedMsg(BaseProtocol *self, const Uint8Buff *peerMsg) in SetIsoPeerProtectedMsg() argument
798 if ((self == NULL) || !IsUint8BuffValid(peerMsg, PROTECTED_MSG_MAX_LEN)) { in SetIsoPeerProtectedMsg()
802 if (DeepCopyUint8Buff(peerMsg, &self->protectedMsg.peerMsg) != HC_SUCCESS) { in SetIsoPeerProtectedMsg()
830 ClearFreeUint8Buff(&impl->base.protectedMsg.peerMsg); in DestroyIsoProtocol()
H A Ddl_speke_protocol.c532 …Uint8Buff *firstProtectedMsg = isVerify ? &(impl->base.protectedMsg.peerMsg) : &(impl->base.protec… in CombineProtectedMsg()
533 …dProtectedMsg = isVerify ? &(impl->base.protectedMsg.selfMsg) : &(impl->base.protectedMsg.peerMsg); in CombineProtectedMsg()
594 impl->base.protectedMsg.peerMsg.length; in CalKcfDataSelf()
622 impl->base.protectedMsg.peerMsg.length; in VerifyKcfDataPeer()
1057 static int32_t SetDlSpekePeerProtectedMsg(BaseProtocol *self, const Uint8Buff *peerMsg) in SetDlSpekePeerProtectedMsg() argument
1059 if ((self == NULL) || !IsUint8BuffValid(peerMsg, PROTECTED_MSG_MAX_LEN)) { in SetDlSpekePeerProtectedMsg()
1063 if (DeepCopyUint8Buff(peerMsg, &self->protectedMsg.peerMsg) != HC_SUCCESS) { in SetDlSpekePeerProtectedMsg()
1091 ClearFreeUint8Buff(&impl->base.protectedMsg.peerMsg); in DestroyDlSpekeProtocol()
H A Dec_speke_protocol.c509 …Uint8Buff *firstProtectedMsg = isVerify ? &(impl->base.protectedMsg.peerMsg) : &(impl->base.protec… in CombineProtectedMsg()
510 …dProtectedMsg = isVerify ? &(impl->base.protectedMsg.selfMsg) : &(impl->base.protectedMsg.peerMsg); in CombineProtectedMsg()
575 impl->base.protectedMsg.peerMsg.length; in CalKcfDataSelf()
608 impl->base.protectedMsg.peerMsg.length; in VerifyKcfDataPeer()
1040 static int32_t SetEcSpekePeerProtectedMsg(BaseProtocol *self, const Uint8Buff *peerMsg) in SetEcSpekePeerProtectedMsg() argument
1042 if ((self == NULL) || !IsUint8BuffValid(peerMsg, PROTECTED_MSG_MAX_LEN)) { in SetEcSpekePeerProtectedMsg()
1046 if (DeepCopyUint8Buff(peerMsg, &self->protectedMsg.peerMsg) != HC_SUCCESS) { in SetEcSpekePeerProtectedMsg()
1074 ClearFreeUint8Buff(&impl->base.protectedMsg.peerMsg); in DestroyEcSpekeProtocol()
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/
H A Dauth_sub_session.c113 static int32_t SetPeerProtectedMsg(AuthSubSession *self, const Uint8Buff *peerMsg) in SetPeerProtectedMsg() argument
115 if ((self == NULL) || (peerMsg == NULL)) { in SetPeerProtectedMsg()
120 return impl->instance->setPeerProtectedMsg(impl->instance, peerMsg); in SetPeerProtectedMsg()
/ohos5.0/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/
H A Dauth_sub_session.h36 int32_t (*setPeerProtectedMsg)(AuthSubSession *self, const Uint8Buff *peerMsg);
/ohos5.0/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/protocol_lib/
H A Dbase_protocol.h26 Uint8Buff peerMsg; member